Skip to content
This repository was archived by the owner on Apr 14, 2021. It is now read-only.

Git based sources and custom sources deprecation#7000

Merged
9 commits merged intomasterfrom
http_and_custom_sources_deprecation
Mar 12, 2019
Merged

Git based sources and custom sources deprecation#7000
9 commits merged intomasterfrom
http_and_custom_sources_deprecation

Conversation

@deivid-rodriguez
Copy link
Copy Markdown
Contributor

What was the end-user problem that led to this PR?

The problem was that our plan for deprecating using git instead of https for custom sources under the hood, and to deprecating those custom sources itself was unclear.

What was your diagnosis of the problem?

My diagnosis was that we should give contradictory/confusing deprecation warnings to users, so we should do this is several steps.

What is your fix for the problem, implemented in this PR?

My fix is to implement the following plan:

  • In bundler 2 (next release, 2.1 for example), start using https by default for the custom sources (:github, :gist, :bitbucket), and deprecate setting the github.https setting to false.
  • In bundler 3, make the setting github.https a noop, using https nevertheless, and go ahead and deprecate the sources.

Why did you choose this fix out of the possible options?

I chose this fix because it's the friendlier path I could think of for our users.

@deivid-rodriguez deivid-rodriguez changed the title git based sources and custom sources deprecation Git based sources and custom sources deprecation Mar 4, 2019
Classic problem: comments do not get as curated as code, so they no
longer make sense. I prefer to remove them and try to keep the code
self-explaining and in good shape instead.
This allows us to get most of the DSL related deprecation specs passing.
To make sure all cases are covered.
And thus its removal even further.
For now, warn only users that are opting out that the setting will be
removed in the future.
@deivid-rodriguez deivid-rodriguez force-pushed the http_and_custom_sources_deprecation branch from 9f53723 to c3cbd4b Compare March 12, 2019 09:16
Bundler 3.0 was incorrect according to the new plan of migrating to
https sources first, and then removing custom sources.
@deivid-rodriguez
Copy link
Copy Markdown
Contributor Author

I haven't got any reviews here, but @indirect agreed with this plan on #6975, so I'm doing this. As with any PRs that I self-merge, please feel free to leave any feedback after-merge and I'll try to address them.

@bundlerbot r+

ghost pushed a commit that referenced this pull request Mar 12, 2019
7000: Git based sources and custom sources deprecation r=deivid-rodriguez a=deivid-rodriguez

### What was the end-user problem that led to this PR?

The problem was that our plan for deprecating using `git` instead of `https` for custom sources under the hood, and to deprecating those custom sources itself was unclear.

### What was your diagnosis of the problem?

My diagnosis was that we should give contradictory/confusing deprecation warnings to users, so we should do this is several steps.

### What is your fix for the problem, implemented in this PR?

My fix is to implement the following plan:

* In bundler 2 (next release, 2.1 for example), start using https by default for the custom sources (`:github`, `:gist`, `:bitbucket`), and deprecate setting the `github.https` setting to false.
* In bundler 3, make the setting `github.https` a noop, using `https` nevertheless, and go ahead and deprecate the sources.

### Why did you choose this fix out of the possible options?

I chose this fix because it's the friendlier path I could think of for our users.


Co-authored-by: David Rodríguez <deivid.rodriguez@riseup.net>
@ghost
Copy link
Copy Markdown

ghost commented Mar 12, 2019

Build succeeded

@ghost ghost merged commit 22db310 into master Mar 12, 2019
@ghost ghost deleted the http_and_custom_sources_deprecation branch March 12, 2019 12:25
ghost pushed a commit that referenced this pull request May 5, 2019
7142: Fully switch to https sources r=indirect a=deivid-rodriguez

### What was the end-user problem that led to this PR?

The problem was that in #7000 I implemented a plan to migrate to https source by default and deprecate github/gist/bitbucket builtin sources, but I changed my mind and I think it's overkill.

The reasons I changed my mind are:

* We [actually announced the switch](https://bundler.io/blog/2019/01/03/announcing-bundler-2.html) and the fact that it didn't happen was not intented. So this can be considered as fixing a bug.

* We have warned non https git sources for ages

https://github.com/bundler/bundler/blob/a6533c0fe6541cc929f895ee0b7a9b673d34cb4d/lib/bundler/source_list.rb#L144-L153

I think people should be ready by now.

Also, we introduced a new setting `github.https` that seems to do essentially the same thing as `git.allow_insecure`. 

### What is your fix for the problem, implemented in this PR?

My fix is to take the initial approach of #6911 and actually do this in the next release.

Co-authored-by: David Rodríguez <deivid.rodriguez@riseup.net>
This pull request was closed.
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant